QuickLens Chrome Extension Turns Rogue with Script Injection Attack


A Chrome extension named QuickLens transformed into a malicious tool after a quiet ownership change. It started injecting scripts and stripping browser security headers from all visited sites. Over 7,000 users faced risks from this silent update pushed on February 17, 2026.

QuickLens originally acted as a Google Lens wrapper for browser image searches. Users could capture screens, select areas, search YouTube frames, or check Amazon products. Google even gave it a Featured badge for solid performance.

Published on October 9, 2025, the extension hit ExtensionHub for sale just two days later. Annex Security researchers spotted the listing early. On February 1, 2026, ownership shifted to a shady entity tied to supportdoodlebuggle.top, with a fake LLC identity.

Version 5.8 brought the real danger. It added a command-and-control server at api.extensionanalyticspro.top. New permissions for declarativeNetRequestWithHostAccess and webRequest slipped past most users. A rules.json file wiped key protections like Content-Security-Policy, X-Frame-Options, and X-XSS-Protection.

Attack Mechanics

The core trick uses a 1×1 transparent GIF image for payload delivery. Here’s how it works in steps.

  • C2 server sends JavaScript as string array to cached-agents-data in local storage.
  • Extension reads this on every page load.
  • Creates hidden base64 GIF image with onload handler running the script.
  • CSP removal lets inline handlers execute freely.

Attackers gain full page access. They steal session tokens, grab form data, scrape content, and exfiltrate to remote servers. The extension still looks normal, masking the threat.

QuickLens 5.8 became a remote code execution platform (Source – Annex)

Key Indicators

TypeValue
Extension IDkdenlnncndfnhkognokgfpabgkgehodd
Extension NameQuickLens – Search Screen with Google Lens
Malicious Version5.8
C2 Domainapi.extensionanalyticspro.top
Developer Email[email protected]
Privacy Policykowqlak.lat
SHA-256 Hashfa3d0c8c8e9f3dacaa9f34e42ad63dceeba16689e055b90e9a903fa274d35df0
Removal DateFebruary 17, 2026 

Static scans miss this attack. Payloads load at runtime only. Names like safelyProcessElement blend with legit code.

Impact and Detection

Sites lose all header defenses. Clickjacking, XSS, and cross-origin attacks become easy. Data theft happens silently across sessions.

Organizations need extension blocklists. Watch for permission jumps, especially net request rules. Users should audit extensions weekly and reject odd prompts.

Google removed it post-discovery. But similar sales on ExtensionHub continue. Verify ownership changes fast.

FAQ

What is QuickLens?

Chrome extension for Google Lens image search with screen capture tools. Had 7,000 users.

How did the attack start?

Ownership sold October 2025, rogue update February 17, 2026 via version 5.8.

What does the pixel trick do?

Hides script in transparent GIF onload to run malicious code after CSP removal.

Which headers got stripped?

Content-Security-Policy, X-Frame-Options, X-XSS-Protection from all responses.

How to spot risky extensions?

Check ownership shifts, new net permissions, vague privacy policies.

Is the extension gone?

Yes, removed February 17, 2026. Block the ID to stay safe.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages